U of L

  Cyber Security Initiative (CSI)

RESOURCES


Research

University of Louisville is classified as a Research (Extensive) university by the National Science Foundation. This classification replaces the formerly known Carnegie classification for research. Information Security research at the university is performed in the following departments: Computer Engineering and Computer Science, Computer Information Systems, Accountancy, Mathematics, Justice Administration, and the Law School. The research focus in each of these departments is directed towards their specialty. The results are presented in international, national, and regional conferences.

The following is a list of recent publications by the faculties in the area of Information Security:

A. Peer Reviewed Publications

  • Guan, J. and Levitan, A.S. 2012. "A Model for Investigating Internal Control Weaknesses," Communications of the Association for Information Systems: Vol. 31, Article 3. [Click here for the link].
  • Hieb, J.L., Schreiver, J., and Graham, J.H. 2012. "Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices," Critical Infrastructure Protection. pp. 85-97. [Click here for the link]
  • Mohamed, A.A., Gavrilova, M.L., and Yampolskiy, R.V. 2012. "Artificial Face Recognition Using Wavelet Adaptive LBP with Directional Statistical Features," Cyberworlds (CW), 2012 International Conference on: IEEE, pp. 23-28. [Click here for the link]
  • Yampolskiy, R., Cho, G., Rosenthal, R., and Gavrilova, M. 2012. "Experiments in Artimetrics: Avatar Face Recognition," Transactions on Computational Science XVI, pp. 77-94. [Click here for the link]
  • Foreman, C.J., Graham, J.H., and Hieb, J.L. 2013. "Mapping Dams Sector Cyber-Security Vulnerabilities," In 26th International Conference on Computer Applications in Industry and Engineering (CAINE 2013). pp. 59-64.
  • Hieb, J.L., Schreiver, J., and Graham, J.H. 2013. "A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices," In International Journal of Critical Infrastructure Protection 6 (1). pp. 12-24.
  • Hieb, J.L., Graham, J.H., and Schreiver, Jacob. et al. 2012. "Security Preprocessor for Industrial Control Networks," In Proceedings of the 7th International Conference on Information Warfare and Security. pp. 130-137.
  • Hieb, J., Graham, J., and Guan, J. 2009. "An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems," IFIP Advances in Information and Communication Technology (311), pp. 125-138. [Click here for the link]
  • Guan, J., Graham, J., and Hieb, J. 2011. "A Digraph Model for Risk Identification and Management in Scada Systems," in: 2011 IEEE International Conference on Intelligence and Security Informatics. pp. 150-155. [Click here for the link]
  • Lauf, A.P., Peters, R.A., and Robinson, W.H. 2010. "A Distributed Intrusion Detection System for Resource-Constrained Devices in Ad-Hoc Networks," Ad Hoc Networks (8:3), pp. 253-266. [Click here for the link]
  • Lauf, A.P., and Robinson, W.H. 2009. "Fault Tolerance in Manets Using a Task-to-Resource Reallocation Framework," CSE (2), pp. 753-758. [Click here for the link]
  • Patel, S.C., Hieb, J.L., and Graham, J.H. 2010. "Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes," I. J. Comput. Appl (17:1), pp. 41-51. [Click here for the link]
  • Mohamed, A.A., Gavrilova, M.L., and Yampolskiy, R.V. 2012. "Artificial Face Recognition Using Wavelet Adaptive Lbp with Directional Statistical Features," 2012 International Conference on Cyberworlds (CW): IEEE, pp. 23-28. [Click here for the link]
  • Yampolskiy, R., Cho, G., Rosenthal, R., and Gavrilova, M. 2012. "Experiments in Artimetrics: Avatar Face Recognition," Transactions on Computational Science XVI, pp. 77-94. [Click here for the link]
  • Yampolskiy, R.V., Klare, B., and Jain, A.K. 2012. "Face Recognition in the Virtual World: Recognizing Avatar Faces," SPIE Defense and Security Symposium on Biometric Technology for Human Identification IX, Baltimore, Maryland, USA. [Click here for the link]

B. Student-led Publications

Below is a list of published papers from the students-led projects. The student authors are indicated by *.

  • Reese*, K., Zheng, Y., and Elmaghraby, A. 2012. A comparison of face detection algorithms in visible and thermal spectrums. 2012. Int'l Conf. on Advances in Computer Science and Application.
  • Mohamed*, A.A., Gavrilova, M.L., and Yampolskiy, R.V. 2013. Recognizing Avatar Faces Using Wavelet-based Adaptive Local Binary Patterns with Directional Statistical Features. Transactions on Computational Sciences Journal (TCS) XVIII. Lecture Notes in Computer Science. Volume 7848, pp. 137-154.
  • Mohamed*, A.A. and Yampolskiy, R.V. 2012. Wavelet Based Multi-scale Adaptive LBP with Directional Statistical Features for Recognizing Artificial Faces. ISRN Machine Vision. No. 810304.
  • McDaniel*, R. and Yampolskiy, R.V. 2012. Development of Embedded CAPTCHA Elements for Bot Prevention in Fischer Random Chess. International Journal of Computer Games Technology, No 178578. (ISSN: 1687-7047) DOI:10.1155/2012/178578
  • D'Souza*, D.D. and Yampolskiy, R.V. 2014. Natural vs Artificial Face Classification using Uniform Local Directional Patterns and Wavelet Uniform Local Directional Patterns. Conference on Computer Vision and Pattern Recognition (CVPR), IEEE Computer Society Workshop on Biometrics. Columbus, OH, USA, June 23, 2014.
  • D'Souza*, D.D., Matchuny*, J., and Yampolskiy, R.V. 2014. Zoo CAPTCHA: Telling Computers and Humans Apart via Animal Image Classification. The Third ASE International Conference on Cyber Security (CyberSecurity2014). Stanford, CA, USA, May 27 - May 31, 2014.
  • Ali*, N., Price*, M., and Yampolskiy, R.V. 2014. BLN-Gram-TF-ITF as a new Feature for Authorship Identification. The Third ASE International Conference on Cyber Security (CyberSecurity2014). Stanford, CA, USA, May 27 - May 31, 2014.
  • Majot*, A., and Yampolskiy, R.V. 2014. AI Safety Engineering through Introduction of Self-Reference into Felicific Calculus via Artificial Pain and Pleasure. IEEE International Symposium on Ethics in Engineering, Science and Technology (Ethics'2014). Chicago, IL, USA. May 23-24, 2014.
  • Beck*, M.B., Desoky, A.H., Rouchka, E.C. and Yampolskiy, R.V. 2014. Decoding Methods for DNA Steganalysis. 6nd International Conference on Bioinformatics and Computational Biology (BICOB2014). Las Vega, NV. March 24-26, 2014.
  • Ouch*, R. and Yampolskiy, R.V. 2014. A Portable Multimodal Biometric System. 9th International Conference on Cyber Warfare and Security (ICCWS-2014). West Lafayette, Indiana, USA. 24-25 March, 2014.

C. Published Books or Chapters of Books

  • Book: Yampolskiy, R. 2009. Game Strategy: A Novel Behavioral Biometric. Independent University Press. ISBN-13: 978-0578036854.
  • Book chapter: Losavio, M.M., Shutt, J.E., and Keeling, D.W. 2011. "The Information Polity: Social and Legal Frameworks for Critical Cyber Infrastructure Protection," in Cyber Infrastructure Protection, T.N. Saadawi and L. Jordan (eds.). Carlisle, PA: Strategic Studies Institute, pp. 129-158.
  • Book chapter: Khalil, Y.H., and Elmaghraby, A.S. 2011. "Resilience of Data Centers," in Cyber Infrastructure Protection, T.N. Saadawi and L. Jordan (eds.). Carlisle, PA: Strategic Studies Institute, pp. 183-206. [Click here for the link]
  • Book chapter: Hieb, J.L., Schreiver, J., and Graham, J.H. 2012. Using Bloom Filters for Checking Access Control and Authentication Requirements for SCADA Field Devices. In Critical Infrastructure Protection VI. pp. 59-71.